


default search action
Andrew C. Simpson
Person information
- affiliation: University of Oxford, UK
Other persons with the same name
- Andrew Simpson 0002 — University College London, Department of Phonetics and Linguistics, UK (and 1 more)
- Andrew Simpson 0003 — Queen Mary University of London, Centre for Digital Music, UK
- Andrew Simpson 0004 — University of Essex, Department of Psychology, UK
- Andrew Simpson 0005
— Macquarie University, Department of Ancient History, Australia
- Andrew Simpson 0006 — Stanford University, CA, USA
- Andrew Simpson 0007 — University of Maryland Baltimore County, 1Department of Biological Sciences, MD, USA
- Andrew Simpson 0008
— University of Sheffield, Management School, UK (and 1 more)
- Andrew Simpson 0009 — South Dakota State University, Department of Mathematics and Statistics, Brookings, SD, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Andrew Simpson
, Matthias Dellago, Daniel W. Woods
:
Formalizing Attack Trees To Support Economic Analysis. Comput. J. 67(1): 220-235 (2024) - [j25]Andrew Simpson
:
Into the unknown: the need to reframe risk analysis. J. Cybersecur. 10(1) (2024) - [j24]Mark Quinlan, Aaron Ceross, Andrew C. Simpson
:
The Efficacy Potential of Cyber Security Advice as Presented in News Articles. Interact. Comput. 37(1): 30-48 (2024) - 2023
- [j23]Yuchen Tian, Weizhe Zhang, Andrew Simpson
, Yang Liu
, Zoe Lin Jiang:
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning. Comput. J. 66(3): 711-726 (2023) - [j22]Thomas Walshe
, Andrew Simpson
:
Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents. DTRAP 4(2): 29:1-29:36 (2023) - [i4]Mark Quinlan, Aaron Ceross, Andrew Simpson
:
The efficacy potential of cyber security advice as presented in news articles. CoRR abs/2304.05309 (2023) - [i3]Mark Quinlan, Aaron Ceross, Andrew Simpson:
The aesthetics of cyber security: How do users perceive them? CoRR abs/2306.08171 (2023) - 2022
- [j21]Thomas Walshe
, Andrew C. Simpson
:
Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations. Comput. Secur. 123: 102936 (2022) - [j20]Adam Zibak, Clemens Sauerwein, Andrew C. Simpson
:
Threat Intelligence Quality Dimensions for Research and Practice. DTRAP 3(4): 44:1-44:22 (2022) - [c84]Thomas Walshe, Andrew Simpson:
A longitudinal study of hacker behaviour. SAC 2022: 1465-1474 - [i2]Mark Quinlan, Jun Zhao, Andrew Simpson:
Connected Vehicles: A Privacy Analysis. CoRR abs/2207.06182 (2022) - 2021
- [j19]Adam Zibak, Clemens Sauerwein, Andrew Simpson
:
A success model for cyber threat intelligence management platforms. Comput. Secur. 111: 102466 (2021) - [j18]Daniel W. Woods, Tyler Moore
, Andrew C. Simpson
:
The County Fair Cyber Loss Distribution: Drawing Inferences from Insurance Prices. DTRAP 2(2): 10:1-10:21 (2021) - [c83]Aaron Ceross
, Andrew Simpson
:
Topic Modelling for Risk Identification in Data Protection Act Judgements. JSAI-isAI Workshops 2021: 62-76 - 2020
- [c82]Marine Eviette, Andrew Simpson
:
Towards Models for Privacy Preservation in the Face of Metadata Exploitation. Privacy and Identity Management 2020: 247-264
2010 – 2019
- 2019
- [j17]Bin Cao, Jianwei Zhao
, Po Yang, Peng Yang, Xin Liu, Jun Qi, Andrew Simpson, Mohamed Elhoseny
, Irfan Mehmood, Khan Muhammad
:
Multiobjective feature selection for microarray data via distributed parallel algorithms. Future Gener. Comput. Syst. 100: 952-981 (2019) - [c81]Adam Zibak, Andrew Simpson
:
Cyber Threat Information Sharing: Perceived Benefits and Barriers. ARES 2019: 85:1-85:9 - [c80]Adam Zibak, Andrew Simpson
:
Towards Better Understanding of Cyber Security Information Sharing. CyberSA 2019: 1-8 - [c79]Jun Qi, Yun Yang
, Xiyang Peng
, Lee Newcombe, Andrew Simpson, Po Yang:
Experimental Analysis of Artificial Neural Networks Performance for Physical Activity Recognition Using Belt and Wristband Devices. EMBC 2019: 2492-2495 - [c78]Yang Liu
, Andrew Simpson
:
On the Trade-Off Between Privacy and Utility in Mobile Services: A Qualitative Study. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 261-278 - [c77]Mark Quinlan
, Jun Zhao
, Andrew Simpson
:
Connected Vehicles: A Privacy Analysis. SpaCCS Workshops 2019: 35-44 - [c76]Andrew Simpson
:
Teaching Introductory Formal Methods and Discrete Mathematics to Software Engineers: Reflections on a Modelling-Focussed Approach. FMTea 2019: 196-211 - [c75]Robin Ankele, Andrew Simpson
:
Abstracting Syntactic Privacy Notions via Privacy Games. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1267-1274 - [c74]Robin Ankele, Andrew Simpson
:
Analysing and Evaluating Syntactic Privacy Games via a Recommender Systems Case Study. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1275-1282 - 2018
- [j16]Emma Osborn
, Andrew Simpson
:
Risk and the Small-Scale Cyber Security Decision Making Dialogue - a UK Case Study. Comput. J. 61(4): 472-495 (2018) - [j15]Majed Alshammari, Andrew Simpson
:
A model-based approach to support privacy compliance. Inf. Comput. Secur. 26(4): 437-453 (2018) - [c73]Daniel W. Woods
, Andrew C. Simpson
:
Towards Integrating Insurance Data into Information Security Investment Decision Making. CyberSA 2018: 1-6 - [c72]Adam Zibak, Andrew Simpson
:
Can We Evaluate the Impact of Cyber Security Information Sharing? CyberSA 2018: 1-2 - [c71]Majed Alshammari, Andrew Simpson
:
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Analysis. DPM/CBT@ESORICS 2018: 209-224 - [c70]Daniel W. Woods
, Andrew C. Simpson
:
Cyber-Warranties as a Quality Signal for Information Security Products. GameSec 2018: 22-37 - [c69]Friska Natalia, Hira Meidia, Nunik Afriliana
, Ala S. Al Kafri
, Sud Sudirman
, Andrew Simpson, Ali Sophian, Mohammed Al-Jumaily, Wasfi Al-Rashdan, Mohammad Bashtawi:
Development of Ground Truth Data for Automatic Lumbar Spine MRI Image Segmentation. HPCC/SmartCity/DSS 2018: 1449-1454 - [c68]Aaron Ceross
, Andrew Simpson
:
Rethinking the Proposition of Privacy Engineering. NSPW 2018: 89-102 - [c67]Robin Ankele, Andrew Simpson
:
Analysis and Evaluation of Syntactic Privacy Notions and Games. PST 2018: 1-2 - [c66]Majed Alshammari, Andrew Simpson
:
Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment. TrustBus 2018: 85-99 - [c65]Majed Alshammari, Andrew Simpson
:
Privacy Architectural Strategies: An Approach for Achieving Various Levels of Privacy Protection. WPES@CCS 2018: 143-154 - 2017
- [j14]Yang Liu
, Andrew Simpson
:
AdSelector: A Privacy-Preserving Advertisement Selection Mechanism for Mobile Devices. Comput. J. 60(8): 1251-1270 (2017) - [j13]Emma Osborn
, Andrew Simpson
:
On small-scale IT users' system architectures and cyber security: A UK case study. Comput. Secur. 70: 27-50 (2017) - [j12]Jaco Jacobs, Andrew Simpson
:
On the formal interpretation and behavioural consistency checking of SysML blocks. Softw. Syst. Model. 16(4): 1145-1178 (2017) - [c64]Majed Alshammari, Andrew Simpson
:
Towards a Principled Approach for Engineering Privacy by Design. APF 2017: 161-177 - [c63]Majed Alshammari, Andrew Simpson
:
Personal Data Management: An Abstract Personal Data Lifecycle Model. Business Process Management Workshops 2017: 685-697 - [c62]Majed Alshammari, Andrew Simpson
:
A UML Profile for Privacy-Aware Data Lifecycle Models. CyberICPS/SECPRE@ESORICS 2017: 189-209 - [c61]Aaron Ceross
, Andrew Simpson
:
The Use of Data Protection Regulatory Actions as a Data Source for Privacy Economics. SAFECOMP Workshops 2017: 350-360 - [c60]Robin Ankele, Andrew Simpson
:
On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party Computation. TrustCom/BigDataSE/ICESS 2017: 1115-1122 - [c59]Eduardo dos Santos, Andrew Simpson
, Dominik Schoop:
A Formal Model to Facilitate Security Testing in Modern Automotive Systems. IMPEX/FM&MDD 2017: 95-104 - [i1]Robin Ankele, Andrew Simpson:
Privacy Games for Syntactic Privacy Notions. IACR Cryptol. ePrint Arch. 2017: 1126 (2017) - 2016
- [j11]Emma Osborn, Andrew C. Simpson
:
On Safety and Security Requirements in Emerging Ubiquitous Computing Models. Comput. J. 59(4): 570-591 (2016) - [j10]Chad Heitzenrater, Andrew C. Simpson
:
Policy, statistics and questions: Reflections on UK cyber security disclosures. J. Cybersecur. 2(1): 43-56 (2016) - [j9]Yang Liu
, Andrew Simpson
:
Privacy-preserving targeted mobile advertising: requirements, design and a prototype implementation. Softw. Pract. Exp. 46(12): 1657-1684 (2016) - [c58]Chad Heitzenrater, Andrew C. Simpson
:
Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements. ARES 2016: 572-581 - [c57]Alan Abe, Andrew Simpson:
Formal Models for Privacy. EDBT/ICDT Workshops 2016 - [c56]Yang Liu
, Andrew Simpson
:
Privacy-Preserving Targeted Mobile Advertising: Formal Models and Analysis. DPM/QASA@ESORICS 2016: 94-110 - [c55]Kubilay Ahmet Küçük
, Andrew Paverd
, Andrew Martin, N. Asokan
, Andrew Simpson
, Robin Ankele:
Exploring the use of Intel SGX for Secure Many-Party Applications. SysTEX@Middleware 2016: 5:1-5:6 - [c54]Chad Heitzenrater, Andrew C. Simpson
:
A case for the economics of secure software development. NSPW 2016: 92-105 - [c53]Chad Heitzenrater, Justin King-Lacroix, Andrew C. Simpson
:
Motivating Security Engineering with Economics: A Utility Function Approach. QRS Companion 2016: 352-359 - [c52]Chad Heitzenrater, Andrew Simpson
:
Software Security Investment: The Right Amount of a Good Thing. SecDev 2016: 53-59 - [c51]Robin Ankele, Kubilay Ahmet Küçük
, Andrew Martin, Andrew Simpson
, Andrew Paverd
:
Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications. UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld 2016: 414-422 - [c50]Eduardo dos Santos, Dominik Schoop, Andrew Simpson
:
Formal models for automotive systems and vehicular networks: Benefits and challenges. VNC 2016: 1-8 - 2015
- [c49]Emma Osborn
, Andrew Simpson
:
Small-Scale Cyber Security. CSCloud 2015: 247-252 - [c48]Chad Heitzenrater, Greg Taylor, Andrew Simpson
:
When the Winning Move is Not to Play: Games of Deterrence in Cyber Security. GameSec 2015: 250-269 - [c47]Andrew C. Simpson
, Andrew P. Martin
, Cas Cremers, Ivan Flechais, Ivan Martinovic, Kasper Bonne Rasmussen:
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security. ICSE (2) 2015: 435-444 - [c46]Chad Heitzenrater, Andrew C. Simpson:
Policy, Statistics, and Questions: Reflections on UK Cyber Security Disclosures. WEIS 2015 - 2014
- [j8]Nicolas Wu
, Andrew C. Simpson
:
Formal relational database design: an exercise in extending the formal template language. Formal Aspects Comput. 26(6): 1231-1269 (2014) - [c45]Jaco Jacobs, Andrew C. Simpson
:
A Formal Model of SysML Blocks Using CSP for Assured Systems Engineering. FTSCS 2014: 127-141 - [c44]Jaco Jacobs, Andrew C. Simpson
:
On the Formal Interpretation of SysML Blocks Using a Safety Critical Case Study. SBCARS 2014: 95-104 - [c43]Jaco Jacobs, Andrew C. Simpson
:
On a Process Algebraic Representation of Sequence Diagrams. SEFM Workshops 2014: 71-85 - 2013
- [c42]Andrew Simpson
, Jaco Jacobs:
On the Cloud-Enabled Refinement Checking of Railway Signalling Interlockings. FTSCS 2013: 195-211 - [c41]Jaco Jacobs, Andrew Simpson
:
Towards a Process Algebra Framework for Supporting Behavioural Consistency and Requirements Traceability in SysML. ICFEM 2013: 265-280 - 2011
- [j7]Andrew C. Simpson:
On Privacy and Public Data: a Study of data.gov.uk. J. Priv. Confidentiality 3(1) (2011) - [c40]David J. Power, Mark Slaymaker
, Andrew Simpson
:
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy. ESSoS 2011: 15-28 - [c39]David J. Power, Mark Slaymaker
, Andrew Simpson
:
Conformance Checking of Dynamic Access Control Policies. ICFEM 2011: 227-242 - 2010
- [c38]Mark Slaymaker
, David J. Power, Andrew Simpson
:
Formalising and Validating RBAC-to-XACML Translation Using Lightweight Formal Methods. ASM 2010: 349-362 - [c37]Nicolas Wu
, Andrew Simpson
:
Towards Formally Templated Relational Database Representations in Z. ASM 2010: 363-376 - [c36]David J. Power, Mark Slaymaker
, Andrew Simpson
:
On the Modelling and Analysis of Amazon Web Services Access Policies. ASM 2010: 394 - [c35]Andrew Simpson
, Mark Slaymaker
, David Gavaghan
:
On the Secure Sharing and Aggregation of Data to Support Systems Biology Research. DILS 2010: 58-73
2000 – 2009
- 2009
- [j6]David J. Power, Mark Slaymaker
, Andrew C. Simpson
:
On Formalizing and Normalizing Role-Based Access Control Systems. Comput. J. 52(3): 305-325 (2009) - [c34]Andrew Simpson
, Mark Slaymaker
, David J. Power, Douglas Russell, Moi Hoon Yap
, Alastair G. Gale:
On the utilisation of a service-oriented infrastructure to support radiologist training. CBMS 2009: 1-4 - [c33]Douglas Russell, David J. Power, Mark Slaymaker
, Ghita Kouadri Mostéfaoui, Xiaoqi Ma
, Andrew Simpson
:
On the Secure Sharing of Legacy Data. ITNG 2009: 1676-1679 - [c32]David J. Power, Mark Slaymaker
, Andrew C. Simpson
:
On the Construction and Verification of Self-modifying Access Control Policies. Secure Data Management 2009: 107-121 - 2008
- [c31]Andrew C. Simpson, David J. Power, Douglas Russell, Mark Slaymaker, Ghita Kouadri Mostéfaoui, Xiaoqi Ma, Graeme Wilson:
A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries. HealthGrid 2008: 3-12 - [c30]Alvis Cheuk M. Fong, Andrew Simpson
:
On Formal Description of Synchronization Requirements in Multimedia Systems. ITNG 2008: 1255-1256 - [c29]Mark Slaymaker
, David J. Power, Douglas Russell, Graeme Wilson, Andrew Simpson
:
Accessing and aggregating legacy data sources for healthcare research, delivery and training. SAC 2008: 1317-1324 - [c28]Mark Slaymaker
, David J. Power, Douglas Russell, Andrew Simpson
:
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data. Secure Data Management 2008: 169-184 - [c27]Andrew Simpson
:
On the need for user-defined fine-grained access control policies for social networking applications. SecureComm 2008 - [c26]Sarah D. Induruwa Fernando, Andrew C. Simpson
:
Towards a Formal Framework for Workflow Interoperability. WS-FM 2008: 158-174 - 2007
- [j5]Sharon Lloyd, David Gavaghan
, Andrew Simpson
, Matthew Mascord, Clint Seneurine, Geoff Williams, Joe Pitt-Francis
, David R. S. Boyd, Damian Mac Randal, Lakshmi Sastry:
Integrative Biology - the challenges of developing a collaborative research environment for heart and cancer modelling. Future Gener. Comput. Syst. 23(3): 457-465 (2007) - [j4]Andrew Simpson
, David J. Power, Mark Slaymaker
, Douglas Russell, Mila Katzarova:
On The Development of Secure Service-Oriented Architectures to Support Medical Research. Int. J. Heal. Inf. Syst. Informatics 2(2): 75-89 (2007) - [c25]Lee Momtahan, Sharon Lloyd, Andrew Simpson
:
Switched Lightpaths for e-Health Applications: Issues and Challenges. CBMS 2007: 459-464 - [c24]Sharon Lloyd, Andrew Simpson
, David J. Power, John R. Geddes
, Ali Khanban, Jeb Palmer:
Developing collaborative technology for neuro-science. CollaborateCom 2007: 432-436 - [c23]Sarah D. Induruwa Fernando, Douglas A. Creager, Andrew C. Simpson
:
Towards Build-Time Interoperability of Workflow Definition Languages. SYNASC 2007: 525-532 - 2006
- [j3]David J. Power, Eugenia A. Politou
, Mark Slaymaker
, Andrew C. Simpson
:
Securing web services for deployment in health grids. Future Gener. Comput. Syst. 22(5): 547-570 (2006) - [c22]Mark Slaymaker
, Andrew Simpson
, Michael Brady, David Gavaghan
, Fiona Reddington, Phil Quirke:
A Prototype Infrastructure for the Secure Aggregation of Imaging and Pathology Data for Colorectal Cancer Care. CBMS 2006: 63-68 - [c21]John R. Geddes
, Clare E. Mackay
, Sharon Lloyd, Andrew Simpson
, David J. Power, Douglas Russell, Mila Katzarova, Martin Rossor
, Nick C. Fox, Jonathon Fletcher, Derek L. G. Hill, Kate McLeish, Joseph V. Hajnal, Stephen M. Lawrie, Dominic Job, Andrew M. McIntosh
, Joanna M. Wardlaw, Peter Sandercock, Jeb Palmer, Dave Perry, Rob Procter
, Jenny Ure, Philip Bath
, Graham Watson:
The Challenges of Developing a Collaborative Data and Compute Grid for Neurosciences. CBMS 2006: 81-86 - [c20]Lee Momtahan, Andrew Simpson
:
Switched Lightpaths for e-Health Applications: a Feasibility Study. CBMS 2006: 469-472 - [c19]John R. Geddes, Clare E. Mackay, Sharon Lloyd, Andrew C. Simpson, David J. Power, Douglas Russell, Marina Jirotka, Mila Katzarova, Martin Rossor, Nick C. Fox, Jonathon Fletcher, Derek L. G. Hill, Kate McLeish, Yu Chen, Joseph V. Hajnal, Stephen M. Lawrie, Dominic Job, Andrew M. McIntosh, Joanna M. Wardlaw, Peter Sandercock, Jeb Palmer, Dave Perry, Rob Procter, Jenny Ure, Mark Hartswood, Roger Slack, Alex Voss, Kate Ho, Philip Bath, Wim Clarke, Graham Watson:
Designing for e-Health: Recurring Scenarios in Developing Grid-based Medical Imaging Systems. HealthGrid 2006: 336-347 - [c18]Douglas A. Creager, Andrew C. Simpson
:
Towards a Fully Generic Theory of Data. ICFEM 2006: 304-323 - [c17]Mila Katzarova, Andrew Simpson
:
Delegation in a Distributed Healthcare Context: A Survey of Current Approaches. ISC 2006: 517-529 - [c16]Andrew C. Simpson
, David J. Power, Mark Slaymaker
:
On tracker attacks in health grids. SAC 2006: 209-216 - 2005
- [j2]Marina Jirotka, Rob Procter
, Mark Hartswood, Roger Slack, Andrew Simpson
, Catelijne Coopmans
, Chris Hinds, Alex Voss
:
Collaboration and Trust in Healthcare Innovation: The eDiaMoND Case Study. Comput. Support. Cooperative Work. 14(4): 369-398 (2005) - [j1]David J. Power, Eugenia A. Politou
, Mark Slaymaker
, Andrew C. Simpson
:
Towards secure Grid-enabled healthcare. Softw. Pract. Exp. 35(9): 857-871 (2005) - [c15]Andrew C. Simpson
, David J. Power, Mark Slaymaker
, Eugenia A. Politou
:
GIMI: Generic Infrastructure for Medical Informatics. CBMS 2005: 564-566 - [c14]John R. Geddes
, Sharon Lloyd, Andrew Simpson
, Martin Rossor
, Nick C. Fox
, Derek L. G. Hill, Joseph V. Hajnal, Stephen M. Lawrie, Andrew M. McIntosh, Eve C. Johnstone, Joanna M. Wardlaw, Dave Perry, Rob Procter, Philip Bath, Edward T. Bullmore:
NeuroGrid: Using Grid Technology to Advance Neuroscience. CBMS 2005: 570-572 - [c13]David J. Power, Mark Slaymaker
, Eugenia A. Politou, Andrew C. Simpson
:
A Secure Wrapper for OGSA-DAI. EGC 2005: 485-494 - [c12]David J. Power, Mark Slaymaker
, Eugenia A. Politou
, Andrew C. Simpson
:
Protecting sensitive patient data via query modification. SAC 2005: 224-230 - [c11]David J. Power, Mark Slaymaker
, Andrew C. Simpson
:
On Deducibility and Anonymisation in Medical Databases. Secure Data Management 2005: 170-184 - 2004
- [c10]David J. Power, Eugenia A. Politou, Mark Slaymaker
, Steve Harris, Andrew C. Simpson
:
A relational approach to the capture of DICOM files for Grid-enabled medical imaging databases. SAC 2004: 272-279 - [c9]Jim Davies, Andrew Simpson
, Andrew P. Martin:
Teaching Formal Methods in Context. TFM 2004: 185-202 - [c8]Dave Stainforth, Andrew P. Martin, Andrew Simpson
, Carl Christensen, Jamie Kettleborough, Tolu Aina, Myles Allen:
Security Principles for Public-Resource Modeling Research. WETICE 2004: 319-324 - 2003
- [c7]Andrew P. Martin
, Andrew Simpson
:
Generalising the Z Schema Calculus: Database Schemas and Beyond. APSEC 2003: 28-37 - [c6]Andrew Simpson
, Andrew P. Martin
, Jeremy Gibbons, Jim Davies, Steve McKeever:
On The Supervision and Assessment Of Part-Time Postgraduate Software Engineering Projects. ICSE 2003: 628-633 - 2002
- [c5]Dave Stainforth, Jamie Kettleborough, Andrew P. Martin, Andrew Simpson, R. Gillis, A. Akkas, R. Gault, Mat Collins, David Gavaghan, Myles Allen:
Climateprediction.net: Design Principles for Publicresource Modeling Research. IASTED PDCS 2002: 32-38
1990 – 1999
- 1999
- [c4]Andrew C. Simpson
, Jonathan M. D. Hill, Stephen R. Donaldson:
BSP in CSP: Easy as ABC. IPPS/SPDP Workshops 1999: 1299-1313 - 1998
- [c3]Andrew Simpson, Jim Woodcock, Jim Davies:
Safety through Security. IWSSD 1998: 18-24 - 1996
- [b1]Andrew C. Simpson:
Safety through security. University of Oxford, UK, 1996 - [c2]Kathryn Burn-Thornton, David Michael Cattrall, Andrew Simpson:
A novel data mining tool for ATM networks. PAKM 1996: 18:1-18:10 - 1994
- [c1]Andrew Simpson
:
A Formal Specification of an Automatic Train Protection System. FME 1994: 602-617
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint